城市(city): unknown
省份(region): unknown
国家(country): Hong Kong
运营商(isp): Hong Kong Telecommunications (HKT) Limited
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 42.200.200.139
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 36668
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1
;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;42.200.200.139. IN A
;; AUTHORITY SECTION:
. 524 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2019111701 1800 900 604800 86400
;; Query time: 110 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Nov 18 06:53:31 CST 2019
;; MSG SIZE rcvd: 118
139.200.200.42.in-addr.arpa domain name pointer 42-200-200-139.static.imsbiz.com.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
139.200.200.42.in-addr.arpa name = 42-200-200-139.static.imsbiz.com.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 209.105.146.127 | attackspam | Unauthorized connection attempt detected from IP address 209.105.146.127 to port 23 |
2020-07-16 18:36:15 |
| 51.68.123.198 | attackbots | 2020-07-16T17:11:16.945573hostname sshd[31521]: Invalid user oy from 51.68.123.198 port 41312 2020-07-16T17:11:19.868952hostname sshd[31521]: Failed password for invalid user oy from 51.68.123.198 port 41312 ssh2 2020-07-16T17:15:47.809969hostname sshd[1158]: Invalid user oracle from 51.68.123.198 port 54934 ... |
2020-07-16 18:18:21 |
| 213.230.93.143 | attackspam | Jul 16 05:49:42 smtp postfix/smtpd[71427]: NOQUEUE: reject: RCPT from unknown[213.230.93.143]: 554 5.7.1 Service unavailable; Client host [213.230.93.143] blocked using cbl.abuseat.org; Blocked - see http://www.abuseat.org/lookup.cgi?ip=213.230.93.143; from= |
2020-07-16 18:41:07 |
| 106.12.59.245 | attackbots | Jul 16 12:25:42 buvik sshd[11768]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.59.245 Jul 16 12:25:45 buvik sshd[11768]: Failed password for invalid user zhong from 106.12.59.245 port 44358 ssh2 Jul 16 12:29:14 buvik sshd[12259]: Invalid user alpha from 106.12.59.245 ... |
2020-07-16 18:34:34 |
| 87.103.120.250 | attackspam | Unauthorised connection attempt detected at AUO MAIN. System is sshd. Protected by AUO Stack Web Application Firewall (WAF) |
2020-07-16 18:44:41 |
| 132.145.128.157 | attackbots | Jul 16 02:20:07 pixelmemory sshd[2138426]: Invalid user dongpe from 132.145.128.157 port 45286 Jul 16 02:20:07 pixelmemory sshd[2138426]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=132.145.128.157 Jul 16 02:20:07 pixelmemory sshd[2138426]: Invalid user dongpe from 132.145.128.157 port 45286 Jul 16 02:20:09 pixelmemory sshd[2138426]: Failed password for invalid user dongpe from 132.145.128.157 port 45286 ssh2 Jul 16 02:23:56 pixelmemory sshd[2150922]: Invalid user tm from 132.145.128.157 port 60140 ... |
2020-07-16 18:43:45 |
| 192.241.222.11 | attack | " " |
2020-07-16 18:42:26 |
| 174.137.65.105 | attackbotsspam | Jul 15 23:47:58 r.ca sshd[9060]: Failed password for admin from 174.137.65.105 port 45986 ssh2 |
2020-07-16 18:26:23 |
| 144.217.85.4 | attackbots | 2020-07-16T14:47:35.451937SusPend.routelink.net.id sshd[67643]: Invalid user git from 144.217.85.4 port 47920 2020-07-16T14:47:37.568249SusPend.routelink.net.id sshd[67643]: Failed password for invalid user git from 144.217.85.4 port 47920 ssh2 2020-07-16T14:53:22.040040SusPend.routelink.net.id sshd[68372]: Invalid user nagios from 144.217.85.4 port 44634 ... |
2020-07-16 18:40:48 |
| 102.133.165.93 | attackbots | Invalid user alphanet from 102.133.165.93 port 8732 |
2020-07-16 18:43:17 |
| 39.59.108.33 | attack | IP 39.59.108.33 attacked honeypot on port: 8080 at 7/15/2020 8:49:31 PM |
2020-07-16 18:30:16 |
| 111.198.54.173 | attackbotsspam | Jul 16 09:02:20 Ubuntu-1404-trusty-64-minimal sshd\[14432\]: Invalid user ita from 111.198.54.173 Jul 16 09:02:20 Ubuntu-1404-trusty-64-minimal sshd\[14432\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.198.54.173 Jul 16 09:02:23 Ubuntu-1404-trusty-64-minimal sshd\[14432\]: Failed password for invalid user ita from 111.198.54.173 port 58624 ssh2 Jul 16 09:21:00 Ubuntu-1404-trusty-64-minimal sshd\[25215\]: Invalid user lfc from 111.198.54.173 Jul 16 09:21:00 Ubuntu-1404-trusty-64-minimal sshd\[25215\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.198.54.173 |
2020-07-16 18:48:14 |
| 20.41.80.226 | attackbots | Jul 16 02:07:41 propaganda sshd[84279]: Connection from 20.41.80.226 port 35282 on 10.0.0.160 port 22 rdomain "" Jul 16 02:07:42 propaganda sshd[84279]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=20.41.80.226 user=root Jul 16 02:07:44 propaganda sshd[84279]: Failed password for root from 20.41.80.226 port 35282 ssh2 |
2020-07-16 18:24:46 |
| 94.177.204.157 | attackbotsspam | Invalid user dye from 94.177.204.157 port 38324 |
2020-07-16 18:33:37 |
| 106.12.68.244 | attackbots | Invalid user silvio from 106.12.68.244 port 46526 |
2020-07-16 18:43:03 |